News & Analysis as of

Cybersecurity Personally Identifiable Information

Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk... more +
Follow this channel for advisories on one of the biggest threats to businesses today. Read a morning brief of fresh guidance and commentary by leading lawyers on security, privacy, risk management, global regulations, data protection, leaks, hacking, cyber insurance, compliance, HIPAA, and every other aspect of cybersecurity of import to corporate readers right now.   less -

Cyberattacks Are the New Norm - How to respond and get insurance recovery for government investigations.

Takeaways - Companies that suffer cyberattacks can expect not sympathy but scrutiny from legal authorities. - D&O insurance can cover not only litigation but also investigation costs. - Strategic negotiation of...more

FTC’s ‘Stick with Security’ Series Carries On

Continuing with its “Stick with Security” series of blog posts for businesses, the Federal Trade Commission worked its way through several more items found in the “Start with Security” guidance....more

Equifax Breach: What Can the Hackers Do with Your Information and How Can You Protect Yourself?

by Bowditch & Dewey on

The Equifax breach is not the biggest in terms of the number of people affected (the 2016 Yahoo breach compromised data associated with over 500 million user accounts compared to the 143 million people affected by the Equifax...more

Taking It Personally: One Lawsuit Tries to Hold Individuals Accountable for the Equifax Data Breach

As we discussed recently, the Equifax data breach has inevitably brought a great deal of scrutiny and legal action against the credit reporting agency. Amidst the numerous brewing class actions and other reactions from...more

When Ripples Become Waves: The Equifax Cybersecurity Incident

Since September 7, 2017, Equifax, one of three credit rating agencies in the United States, has been dealing with the fallout from one of the largest (known) data breaches of personal information, putting 143 million...more

Protecting Your Identity After a Data Breach

by Jones Day on

In light of recent high-profile breaches of highly sensitive data, this is a good time to remind individuals of how to protect their identity and credit information....more

CyberSecurity Regulation Back on Center Stage After Data Breach

by Goodwin on

The issue of cybersecurity is back in front of Congress in the wake of the news of the data breach at Equifax Inc., which reportedly has affected approximately 143 million consumers. Various industry trade groups, including...more

In the Wake of Harvey and Irma, OCR Reminds Providers of HIPAA Rules

As Texas, Florida, and the Caribbean rebuild after the latest string of deadly hurricanes and prepare for the possibility of future storms, the U.S. Department of Health and Human Services (HHS) Office for Civil Rights (OCR)...more

Lessons from the Equifax Breach

by Poyner Spruill LLP on

As data breaches go, they don’t get much bigger than this. On Thursday, September 7, credit reporting giant, Equifax, reported that it had suffered a cyber-incident. 143 million consumer records, including names, birth dates,...more

The Mintz Matrix – September 2017

As data breaches dominate national headlines it remains important as ever for businesses to invest in security and to be ready to respond if a breach occurs. Part of your preparedness program should be staying current on data...more

Equifax Week Two: It Keeps Getting Worse

The drumbeat of bad news continues for credit monitoring agency Equifax Inc., after its disclosure on September 7th of a massive data breach – compromising Social Security numbers, dates of birth and other personally...more

Legal Implications and Initial Takeaways from the Equifax Data Breach

On September 7, Equifax, one of three nationwide credit-reporting agencies that compile and evaluate the financial history of consumers, announced that it suffered a security breach in which sensitive information of...more

Apple X’s Face ID Feature Places Spotlight on Facial Recognition Technology, Raising Numerous Mobile Privacy and Data Usage Issues

This week’s Apple X announcement was not more than a few hours old, and the questions began to come in. Apple’s introduction of Face ID facial recognition on its new phone – although already available in some form on several...more

Privacy Tip #105 – Data Breach Woes

I spend a lot of time and effort to protect the privacy of my personal information. I am very careful. I have pretty good security hygiene. But I don’t have total control of my personal information and it is frustrating. I am...more

Equifax Breach: Three Takeaways from the First Four Days

by Mintz Levin on

On September 7, 2017, Equifax, one of the three large credit reporting bureaus, announced a cybersecurity incident impacting approximately 143 million U.S. consumers. According to Equifax, the breach occurred mid-May through...more

FTC Provides Guidance on Data Security in Its “Stick With Security” Blog

by McGuireWoods LLP on

Building on the FTC’s “Start with Security” guide for businesses, the agency launched the “Stick with Security” blog on July 21, 2017. The blog provides additional guidance on each of the 10 fundamental principles of data...more

Privacy Perils: Hackers Breach Instagram User Accounts

by Bass, Berry & Sims PLC on

Engineers at Instagram have revealed that hackers managed to gain access to the contact numbers and email addresses (but not passwords) of some of Instagram's users via a bug in the app's API (Application Programming...more

Government Response to Increasing Cyber Threats

by McGuireWoods LLP on

Government agencies collect and hold massive amounts of personally identifiable information (PII), creating valuable targets for cybercrime. Recently proposed legislation would impose baseline standards for cyber hygiene on...more

2017 Data Breach Litigation Report

by Bryan Cave on

2016 was another year in which data breaches continued to dominate the headlines, a constant reminder to people that their personal information was vulnerable and the target of criminal attacks. Yet, despite the fact that...more

More Companies Must Comply with the Gramm-Leach-Bliley Act, But Don’t Know It. Are You One of Them?

by Dickinson Wright on

When the topic of data privacy and cyber security comes up, most people automatically think of data breaches, especially given the high-profile nature of so many of them. Breaches and hacks are certainly an issue about which...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

by Mintz Levin on

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

Will I Get Sued After a Data Breach? D.C. Circuit Broadens Scope of Data That Gives Rise to Identity Theft in CareFirst

by Orrick - Trust Anchor on

In the latest sign that data breach class actions are here to stay—and, indeed, growing—the D.C. Circuit resuscitated claims against health insurer CareFirst BlueCross and Blue Shield, following a 2015 breach that compromised...more

Delaware Amends Personal Information Protection Law

by Moore & Van Allen PLLC on

On August 17, 2017, Delaware amended its personal information protection law, Delaware Code Title 6, Chapter 12B. The amendment becomes effective 240 days after enactment or March 14, 2018. The amended law significantly...more

Connecting the Dots: Key Developments and Best Practices for Evaluating Privacy and Security Risks in IoT Investments

by Shearman & Sterling LLP on

The market for internet-connected devices (often referred to as the Internet of Things, or IoT) is growing rapidly. Investment in this burgeoning space can be attractive, and according to research firm IDC, the worldwide...more

Massachusetts Lawmakers Turn Attention to Cybersecurity

In the wake of growing concerns about data privacy and cyber threats, Massachusetts lawmakers are increasingly focused on evaluating and improving the state’s cybersecurity policies and information technology infrastructure....more

637 Results
|
View per page
Page: of 26
Cybersecurity

"My best business intelligence,
in one easy email…"

Your first step to building a free, personalized, morning email brief covering pertinent authors and topics on JD Supra:
Sign up using*

Already signed up? Log in here

*By using the service, you signify your acceptance of JD Supra's Privacy Policy.
*With LinkedIn, you don't need to create a separate login to manage your free JD Supra account, and we can make suggestions based on your needs and interests. We will not post anything on LinkedIn in your name. Or, sign up using your email address.